{"id":2101,"date":"2021-10-28T16:44:06","date_gmt":"2021-10-28T23:44:06","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2101"},"modified":"2023-11-07T16:37:09","modified_gmt":"2023-11-07T21:37:09","slug":"zero-trust-recommendations","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","title":{"rendered":"Rekomendasi untuk Zero Trust"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Pada minggu ke-4 Bulan Kesadaran Keamanan Siber, kami berfokus pada mengutamakan keamanan siber-sebuah perhatian yang lebih besar lagi di era tempat kerja hibrida dan proliferasi perangkat. Zero trust adalah pendekatan pragmatis untuk mengautentikasi, mengesahkan, dan memvalidasi semua pengguna, baik di dalam maupun di luar jaringan Anda. Pelajari bagaimana SecurID memberdayakan pendekatan tanpa kepercayaan Anda terhadap keamanan siber.<\/p>","protected":false},"author":2,"featured_media":2102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recommendations for Zero Trust - RSA<\/title>\n<meta name=\"description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T23:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta name=\"twitter:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Recommendations for Zero Trust\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"name\":\"Recommendations for Zero Trust - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"description\":\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recommendations for Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rekomendasi untuk Zero Trust - RSA","description":"Pelajari bagaimana SecurID memberdayakan pendekatan zero-trust Anda terhadap keamanan siber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_locale":"id_ID","og_type":"article","og_title":"Recommendations for Zero Trust","og_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","og_url":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_site_name":"RSA","article_published_time":"2021-10-28T23:44:06+00:00","article_modified_time":"2023-11-07T21:37:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Recommendations for Zero Trust","twitter_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Recommendations for Zero Trust","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","articleSection":["Zero Trust"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","name":"Rekomendasi untuk Zero Trust - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","description":"Pelajari bagaimana SecurID memberdayakan pendekatan zero-trust Anda terhadap keamanan siber.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Recommendations for Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solusi Keamanan Siber dan Manajemen Risiko Digital","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"predecessor-version":[{"id":27157,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2101\/revisions\/27157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media\/2102"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}